Somewhere along the line a marketer cooked up volume, variety, and velocity to describe Big Data. Well, VVV is good but now we have VVVVV. Want to know more about “value” and “veracity”? Navigate to “2 More Big Data V’s—Value and Veracity.” The new Vs are slippery. How does one demonstrate value. The write up does not nail down the concept. There are MBA type references to ROI, use cases, and brand. Not much numerical evidence or a credible analytic foundation is presented. Isn’t “value” a matter of perception. Numbers may not be needed. Veracity is also a bit mushy. What about Brian Williams’ and his oft repeated “conflation”? What about marketing collateral for software vendors in search of a sale? I typed 25 and moved on. Neither a big number nor much in the way of big data.
SchwartzReport: Net Net — Good New Rules from FCC — Bad Time Warner 97% Profit Margin
Advanced Cyber/IO, IO ImpotencyGOOD: This is some wonderful news. The process is still not complete but the right decision appears imminent. Tele-communications are going to be seen as public utilities, equally open to all. There is still a vote to go, so it wouldn't hurt to write the FCC once again and tell them you support Chairman Wheeler's draft.
The head of the FCC just proposed the strongest net neutrality rules ever
BAD: This is why FCC Chairman Wheeler's plan is so important. Left to their own devices tele-communications companies would strip you down to you skives.
Time Warner Cable's 97 Percent Profit Margin on High-Speed Internet Service Exposed
John Robb: Bringing Down the (Corrupt) USA
Corruption, Government, Idiocy, Ineptitude, IO Deeds of War, IO ImpotencyHere's an interesting US systempunkt — a systempunkt is the point in a big network where even a small attack would cause the entire network to fail. This systempunkt would enable a prepared individual the unique ability to shut down a large part of the US without shedding a drop of blood. For example, this attack has the ability to:
Continue reading “John Robb: Bringing Down the (Corrupt) USA”
Stephen E. Arnold: Time as Analytic Factor — Recorded Future, Google, and CyberOSINT
Advanced Cyber/IO, IO ImpotencyRecorded Future: Google and Cyber OSINT
EXTRACT: CyberOSINT relies on automated collection, analysis, and report generation. In order to make sense of data and information crunched by an NGIA system, time is a really key metatag item. To figure out time, a system has to understand: 1) The date and time stamp; 2) Versioning (previous, current, and future document, data items, and fact iterations); 3) Times and dates contained in a structured data table; 4) Times and dates embedded in content objects themselves; for example, a reference to “last week” or in some cases, optical character recognition of the data on a surveillance tape image. Learn more.
Stephen E. Arnold: Autonomy – Leader of a Sorry Pack
IO ImpotencyAutonomy: Leading the Push Beyond Enterprise Search
In “CyberOSINT: Next Generation Information Access,” I describe Autonomy’s math-first approach to content processing. The reason is that after the veil of secrecy was lifted with regard to the signal processing`methods used for British intelligence tasks, Cambridge University became one of the hot beds for the use of Bayesian, LaPlacian, and Markov methods.
Continue reading “Stephen E. Arnold: Autonomy – Leader of a Sorry Pack”
Martin Petersen: Lessons Learned Doing Intelligence Analysis for Makers of US Foreign Policy
Advanced Cyber/IO, Cultural Intelligence, Ethics, Government, IO ImpotencyWhat I Learned in 40 Years of Doing Intelligence Analysis for US Foreign Policymakers
Martin Petersen, Studies in Intelligence, 2011
PDF (8 Pages): Petersen-What I Learned-20Apr2011
Policymakers do not always see how we can help them.
Reference: $499 Saves Millions — Stephen E. Arnold CyberOSINT Survey of Next Generation Information Access (NGIA) – Foreword by Robert Steele
Advanced Cyber/IO, IO ImpotencyAn Arnold IT CORE Report for Law Enforcement, Security and Intelligence Professionals and Organizations
This monograph has a single goal: Provide a Contracting Officer (CO) or Contracting Officer's Technical Representative (COTR) — or the end-user engaged in investigatory work, military operations, and intelligence activities — with a collection of technology capability summaries about companies building next-generation tools…critical insights that could save millions in mis-placed capitalization.
“CyberOSINT is the first discussion of the innovative software that makes sense of the flood of open source digital information. Law enforcement, security, and intelligence professionals will find this an invaluable resource to identify automated ways to deal with Big Data.”
– Dr. Jerry Lucas, President, Telestrategies ISS
Table of Contents with topics covered and companies profiled below the line along with full-text of the Foreword by Robert Steele and Preface by Stephen Arnold.